cybersec info
Hi!
Del Norte High School CYBER CEO club :D
common knowledge here that im too lazy to take notes here because i had like 1k lines in the last pagee which im too lazy to use :P
Questions
- Cybersecurity Landscape
- Threats and how to combat
- Ethical hackers
- Carreer Oppertnities
- What should CS students do.
- Biggest challenges
- Future of Cybersecurity - what trends in the next few years.
- How do pros prepare to constant evolving threats
David Tomaz - Intelligence Analyst san diego office FBI - GOVERNMENT
- He is working for FBI and is responsible for finding some hackers, works well with ramsomware.
- Ransomware is importnat and steals hundreds of thousands of dollars from the economy and he stops that.
- Sees it as how you are either a tester and have legal authority or you do not have it. Is a legal question. People are good at breaking into networks are really good for being employed into ethical hackers :D
- Hated and still and always hated computers. Wanted to work in internatinoal relations but ended up in cyber. Is easy and
- If just get into there, be nice, be a good person, be nice, be organized, be likable, be not like Ruhaan.
- Don’t be ignorant, and needs to learn how to learn quickly. Outreach is very important.
- Artifical Intelligence, people might be lost through AI. Coders can be replaced by AI. This is the largest threat :P
- Do a lot of reading, learns a lot of things. Need to have a network, to identify people who are good and talk to them. They will help you. In other words? Don’t be introverted.
Tricia Mercer - CPO at INDUS and board of directors member at San Diego Cyber Center of Exellence - INDUSTRY
- Dealt with a seinor leader who has financial issues and found that the would steal company data and to disclose NDA’s, and filed lawsuit of them.
- Phishing, and even if many different people all have multipule different traning to prevent phishing, a significant portion of people have all falling under to phising.
- Integrity in cyber security is very important.
- Mom wanted to learn about computers, then got her into wanting to track bad guys.
- Have background in IT, be a good person. Build own network at home and try to hack your own network.
- Get leadership to understand why you should do that and why it would be good. In other words, dumb it down so buisness leaders can understand whats going on.
- In the next 5-10 years every entity is going to pritoritize cyber. Large companies do but smaller companies dont. Programmers have no clue how to secure code.
- Staying informed, being curious, new things come out at any time. (HMM RUHAAN SEEMS LIKE SOMETHING YOU SHOULD DO TO HELP US INSTEAD)
Victor Nezeata - Founder and CEO of Cyber Brain Academy. Adjunt Professor at USD - ACADEMIA
- Mostly preventing people’s personal information getting leaked, gets rid of old data in the system.
- Helps prevent AI and how it it used as a cyber attack weapon.
Zero Day - Vulernability that has no patch.
- Best way to test home security is getting a real hacker to break into your system. Ethical hackers are the hackers that do it. Rembmber to check ethical hackers and how they do things
- Officer in the army. Wanted to be a software developer but realized he did not like it, but then fell in love with cyber security.
- Get background in IT. Is easier to get job and understand while knowing how IT.
- In his time at Kuwait he had to pick 5 to move into the country and to live in. Cybercurity is also dependentt on people, where the employees and staff are still very important (because they are the people doing cybersecurity)
- More specalization in Healthcare IT. Healthcare is very different because theres more risk, such as instead of just computers there are people at risk. Try to educate the current workforce to have similar skillset that hackers have.
- Have to constantly learn, just like how medicine does. Cybercurity is simlilar to a team sport. NEEDS COLLABORATION. github??? open source :D. Community helps a lot.
Fun Learning Thing That Mort Asked
Response: create a server. about ZTF enviornments just follow process. Follow the process is apparently a very important thing. Use linux kalli linux terms
Q: any specific certifications ISC2 certification called CC text
Q: SRIJAN QUESTION YAYYYYYYYYY how quickly does the pipeline from reaserch to theoretical in cybersecurity A: if say Zero Day, the attackers will do it ASAP, exploits will come up as soon as possible. Usually target microsoft.
Q: How to make sure people are up to date with these things A: keep up with the trends. Train people on it. Dude just read the news..
KEY LEARNINGS
- Talk to people
- Code Code Code? NO! Learn Learn Learn!
- It’s not hard to learn it, so learn it!
- Slackers will be in every group, this is a good place to learn how to deal with them.
- CyberSec is something that anyone can learn, and is a great job to do :D
I’m the person in the center (to the right of the other two)